Skip to content

Instantly share code, notes, and snippets.

- type: log
enabled: true
paths:
- /var/log/crowdstrike/falconhoseclient/output
multiline.pattern: '^{'
multiline.negate: true
multiline.match: after
multiline.max_lines: 5000
multiline.timeout: 10
output {
if [@metadata][pipeline] {
elasticsearch {
hosts => ["http://localhost:9200"]
index => "%{[@metadata][beat]}-%{[@metadata][version]}-%{+YYYY.MM.dd}"
user => "elastic"
password => "changeme"
pipeline => "%{[@metadata][pipeline]}"
}
} else {
{
"date": {
"field": "crowdstrike.metadata.eventCreationTime",
"target_field": "@timestamp",
"formats": ["UNIX_MS"],
"timezone": "UTC"
}
},
{
"set": {
@tonymeehan
tonymeehan / gist:d920f6fd49e9fb25fd6312d311f9b45e
Last active October 14, 2021 12:19
Getting started with adding a new security data source in your Elastic SIEM - Ingest Pipeline
PUT _ingest/pipeline/crowdstrike_falcon
{
"processors":
[
{
"set": {
"field": "event.action",
"value": "{{crowdstrike.event.PatternDispositionDescription}}",
"if": "ctx.crowdstrike?.event?.PatternDispositionDescription != null"
}
@tonymeehan
tonymeehan / gist:23f434b23265241274e76383bdc85561
Last active April 8, 2020 14:28
Getting started with adding a new security data source in your Elastic SIEM - Filebeat configuration
filebeat.inputs:
- type: log
paths:
- /var/log/crowdstrike/falconhoseclient/output
multiline.pattern: '^{'
multiline.negate: true
multiline.match: after
@tonymeehan
tonymeehan / gist:51b68ebde9f789ce50280cf115459773
Last active April 24, 2020 18:03
Getting started with adding a new security data source in your Elastic SIEM - Filebeat processors configuration
filebeat.inputs:
- type: log
paths:
- /var/log/crowdstrike/falconhoseclient/output
multiline.pattern: '^{'
multiline.negate: true
multiline.match: after
@tonymeehan
tonymeehan / gist:2cdf235c82192fcaa58787f6bb552ffb
Last active January 21, 2021 08:22
Getting started with adding a new security data source in your Elastic SIEM - Logstash configuration
input {
beats {
port => 5044
}
}
filter {
if [crowdstrike][metadata][eventType] != "DetectionSummaryEvent" {
drop { }
}